{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T12:59:22Z","timestamp":1761569962398,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,20]]},"DOI":"10.1145\/3755881.3755883","type":"proceedings-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:17Z","timestamp":1761565577000},"page":"378-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["FIRE: Smart Contract Bytecode Function Identification via Graph-Refined Hybrid Feature Encoding"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9830-850X","authenticated-orcid":false,"given":"Yu","family":"Sun","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, HangZhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1846-0921","authenticated-orcid":false,"given":"Lingfeng","family":"Bao","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, HangZhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4111-4189","authenticated-orcid":false,"given":"Xiaohu","family":"Yang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Blockchain and Data Security, Zhejiang University, HangZhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"crossref","unstructured":"Frances\u00a0E Allen. 1970. Control flow analysis. ACM Sigplan Notices 5 7 (1970) 1\u201319.","DOI":"10.1145\/390013.808479"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"crossref","unstructured":"Roberto Baldoni Emilio Coppa Daniele\u00a0Cono D\u2019elia Camil Demetrescu and Irene Finocchi. 2018. A survey of symbolic execution techniques. ACM Computing Surveys (CSUR) 51 3 (2018) 1\u201339.","DOI":"10.1145\/3182657"},{"key":"e_1_3_3_3_4_2","first-page":"845","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Bao Tiffany","year":"2014","unstructured":"Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, and David Brumley. 2014. { BYTEWEIGHT} : Learning to recognize functions in binary code. In 23rd USENIX Security Symposium (USENIX Security 14). 845\u2013860."},{"key":"e_1_3_3_3_5_2","volume-title":"Heimdall-rs","author":"Becker Jonathan","year":"2024","unstructured":"Jonathan Becker. 2024. Heimdall-rs. https:\/\/github.com\/Jon-Becker\/heimdall-rs"},{"key":"e_1_3_3_3_6_2","unstructured":"Lexi Brent Anton Jurisevic Michael Kong Eric Liu Francois Gauthier Vincent Gramoli Ralph Holz and Bernhard Scholz. 2018. Vandal: A scalable security analysis framework for smart contracts. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1809.03981 (2018)."},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00021"},{"key":"e_1_3_3_3_8_2","unstructured":"Dedaub. 2024. Dedaub Decompiler. https:\/\/app.dedaub.com\/decompile."},{"key":"e_1_3_3_3_9_2","volume-title":"ABI Specification: Function Selector","author":"Documentation Solidity","year":"2024","unstructured":"Solidity Documentation. 2024. ABI Specification: Function Selector. https:\/\/docs.soliditylang.org\/en\/v0.8.26\/abi-spec.html#function-selector"},{"key":"e_1_3_3_3_10_2","volume-title":"Solidity Documentation","author":"Documentation Solidity","year":"2024","unstructured":"Solidity Documentation. 2024. Solidity Documentation. https:\/\/docs.soliditylang.org"},{"volume-title":"Ethereum (ETH) blockchain explorer","year":"2024","key":"e_1_3_3_3_11_2","unstructured":"Etherscan. 2024. Ethereum (ETH) blockchain explorer. https:\/\/etherscan.io\/"},{"volume-title":"Online Solidity Decompiler","year":"2024","key":"e_1_3_3_3_12_2","unstructured":"EthervmDec. 2024. Online Solidity Decompiler. https:\/\/ethervm.io\/decompile"},{"key":"e_1_3_3_3_13_2","volume-title":"Reverse engineering code with IDA Pro","author":"Ferguson Justin","year":"2008","unstructured":"Justin Ferguson and Dan Kaminsky. 2008. Reverse engineering code with IDA Pro. Syngress."},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Matt\u00a0W Gardner and SR Dorling. 1998. Artificial neural networks (the multilayer perceptron)\u2014a review of applications in the atmospheric sciences. Atmospheric environment 32 14-15 (1998) 2627\u20132636.","DOI":"10.1016\/S1352-2310(97)00447-0"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00120"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"crossref","unstructured":"Neville Grech Sifis Lagouvardos Ilias Tsatiris and Yannis Smaragdakis. 2022. Elipmoc: Advanced decompilation of ethereum smart contracts. Proceedings of the ACM on Programming Languages 6 OOPSLA1 (2022) 1\u201327.","DOI":"10.1145\/3527321"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"crossref","unstructured":"Laune\u00a0C Harris and Barton\u00a0P Miller. 2005. Practical analysis of stripped binary code. ACM SIGARCH Computer Architecture News 33 5 (2005) 63\u201368.","DOI":"10.1145\/1127577.1127590"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Jiahao He Shuangyin Li Xinming Wang Shing-Chi Cheung Gansen Zhao and Jinji Yang. 2023. Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode. Journal of Systems and Software 199 (2023) 111627.","DOI":"10.1016\/j.jss.2023.111627"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"crossref","unstructured":"S Hochreiter. 1997. Long Short-term Memory. Neural Computation MIT-Press (1997).","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"crossref","unstructured":"Wen Hu Zhipeng Fan and Ye Gao. 2019. Research on smart contract optimization method on blockchain. IT Professional 21 5 (2019) 33\u201338.","DOI":"10.1109\/MITP.2019.2923604"},{"key":"e_1_3_3_3_21_2","unstructured":"Kun Jing and Jungang Xu. 2019. A survey on neural network language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1906.03591 (2019)."},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"Satpal\u00a0Singh Kushwaha Sandeep Joshi Dilbag Singh Manjit Kaur and Heung-No Lee. 2022. Ethereum smart contract analysis tools: A systematic review. Ieee Access 10 (2022) 57037\u201357062.","DOI":"10.1109\/ACCESS.2022.3169902"},{"key":"e_1_3_3_3_23_2","first-page":"3","volume-title":"Icml","author":"Lafferty John","year":"2001","unstructured":"John Lafferty, Andrew McCallum, Fernando Pereira, et\u00a0al. 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In Icml, Vol.\u00a01. Williamstown, MA, 3."},{"key":"e_1_3_3_3_24_2","unstructured":"Sifis Lagouvardos Yannis Bollanos Neville Grech and Yannis Smaragdakis. 2024. The Incredible Shrinking Context... in a decompiler near you. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2409.11157 (2024)."},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3691620.3695601"},{"key":"e_1_3_3_3_26_2","unstructured":"I Loshchilov. 2017. Decoupled weight decay regularization. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1711.05101 (2017)."},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"crossref","unstructured":"Nicholas\u00a0D Matsakis and Felix\u00a0S Klock. 2014. The rust language. ACM SIGAda Ada Letters 34 3 (2014) 103\u2013104.","DOI":"10.1145\/2692956.2663188"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"crossref","unstructured":"J Omura. 1969. On the Viterbi decoding algorithm. IEEE transactions on information theory 15 1 (1969) 177\u2013179.","DOI":"10.1109\/TIT.1969.1054239"},{"key":"e_1_3_3_3_29_2","unstructured":"palkeo. 2024. Panoramix. https:\/\/github.com\/palkeo\/panoramix."},{"key":"e_1_3_3_3_30_2","unstructured":"Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga et\u00a0al. 2019. Pytorch: An imperative style high-performance deep learning library. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_3_3_31_2","unstructured":"Peng Qian Zhenguang Liu Qinming He Butian Huang Duanzheng Tian and Xun Wang. 2022. Smart contract vulnerability detection technique: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2209.05872 (2022)."},{"key":"e_1_3_3_3_32_2","first-page":"798","volume-title":"AAAI","author":"Rosenblum Nathan\u00a0E","year":"2008","unstructured":"Nathan\u00a0E Rosenblum, Xiaojin Zhu, Barton\u00a0P Miller, and Karen Hunt. 2008. Learning to Analyze Binary Computer Code.. In AAAI. 798\u2013804."},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"crossref","unstructured":"Sara Rouhani and Ralph Deters. 2019. Security performance and applications of smart contracts: A systematic survey. IEEE Access 7 (2019) 50759\u201350779.","DOI":"10.1109\/ACCESS.2019.2911031"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"crossref","unstructured":"Helmut Schmid. 1994. Part-of-speech tagging with neural networks. arXiv preprint cmp-lg\/9410018 (1994).","DOI":"10.3115\/991886.991915"},{"key":"e_1_3_3_3_35_2","first-page":"611","volume-title":"24th USENIX security symposium (USENIX Security 15)","author":"Shin Eui Chul\u00a0Richard","year":"2015","unstructured":"Eui Chul\u00a0Richard Shin, Dawn Song, and Reza Moazzezi. 2015. Recognizing functions in binaries with neural networks. In 24th USENIX security symposium (USENIX Security 15). 611\u2013626."},{"key":"e_1_3_3_3_36_2","volume-title":"Java and the Java virtual machine: definition, verification, validation","author":"St\u00e4rk Robert\u00a0F","year":"2012","unstructured":"Robert\u00a0F St\u00e4rk, Joachim Schmid, and Egon B\u00f6rger. 2012. Java and the Java virtual machine: definition, verification, validation. Springer Science & Business Media."},{"key":"e_1_3_3_3_37_2","unstructured":"Petar Velickovic Guillem Cucurull Arantxa Casanova Adriana Romero Pietro Lio Yoshua Bengio et\u00a0al. 2017. Graph attention networks. stat 1050 20 (2017) 10\u201348550."},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"crossref","unstructured":"Zeli Wang Hai Jin Weiqi Dai Kim-Kwang\u00a0Raymond Choo and Deqing Zou. 2021. Ethereum smart contract security research: survey and future research opportunities. Frontiers of Computer Science 15 (2021) 1\u201318.","DOI":"10.1007\/s11704-020-9284-9"},{"key":"e_1_3_3_3_39_2","unstructured":"Gavin Wood et\u00a0al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 2014 (2014) 1\u201332."},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"crossref","unstructured":"Zonghan Wu Shirui Pan Fengwen Chen Guodong Long Chengqi Zhang and S\u00a0Yu Philip. 2020. A comprehensive survey on graph neural networks. IEEE transactions on neural networks and learning systems 32 1 (2020) 4\u201324.","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1168\/2\/022022"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616343"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"crossref","unstructured":"Zibin Zheng Shaoan Xie Hong-Ning Dai Weili Chen Xiangping Chen Jian Weng and Muhammad Imran. 2020. An overview on smart contracts: Challenges advances and platforms. Future Generation Computer Systems 105 (2020) 475\u2013491.","DOI":"10.1016\/j.future.2019.12.019"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"crossref","unstructured":"Di Zhu Feng Yue Jianmin Pang Xin Zhou Wenjie Han and Fudong Liu. 2022. Bytecode similarity detection of smart contract across optimization options and compiler versions based on triplet network. Electronics 11 4 (2022) 597.","DOI":"10.3390\/electronics11040597"}],"event":{"name":"Internetware 2025: the 16th International Conference on Internetware","sponsor":["SIGSOFT ACM Special Interest Group on Artificial Intelligence"],"location":"Trondheim Norway","acronym":"Internetware 2025"},"container-title":["Proceedings of the 16th International Conference on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3755881.3755883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:30Z","timestamp":1761565590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3755881.3755883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":44,"alternative-id":["10.1145\/3755881.3755883","10.1145\/3755881"],"URL":"https:\/\/doi.org\/10.1145\/3755881.3755883","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}